Fingerprint-based authentication method, fingerprint authentication-based first server and fingerprint authentication-based terminal

An authentication method and server technology, applied in the first server and terminal based on fingerprint authentication, in the field of authentication methods, can solve problems such as inability to log in, multiple user IDs and passwords that are easy to remember and mix

Active Publication Date: 2018-05-29
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of this, the embodiment of the present invention expects to provide a fingerprint-based authentication method, a first server and terminal based on fingerprint authentication, which solves the need to input the corresponding user ID and password when accessing different application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint-based authentication method, fingerprint authentication-based first server and fingerprint authentication-based terminal
  • Fingerprint-based authentication method, fingerprint authentication-based first server and fingerprint authentication-based terminal
  • Fingerprint-based authentication method, fingerprint authentication-based first server and fingerprint authentication-based terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] In order to solve the technical problems existing in the background technology, an embodiment of the present invention provides a fingerprint-based authentication method, which is applied to a fingerprint-based authentication system including at least a first server and a terminal based on fingerprint authentication, figure 1 It is a schematic diagram of the implementation flow of the fingerprint-based authentication method according to the embodiment of the present invention, as figure 1 As shown, the method includes:

[0046] Step S101, determining first fingerprint information;

[0047] Here, the terminal receives the first fingerprint input by the user through the fingerprint entry sensor; judges whether it has received an instruction to confirm the completion of the input sent by the terminal; the second fingerprint until receiving an instruction from the terminal to confirm the completion of the input; determine the first fingerprint information according to the ...

Embodiment 2

[0059] The embodiment of the present invention further provides a fingerprint-based authentication method, which is applied to a fingerprint-based authentication system, and the authentication system includes at least a first server, a second server, and a third server, and the method includes the following steps:

[0060] In the first step, the first server receives the first request sent by the second server;

[0061] Here, the first request is used to request to log in to the third server; in the embodiment of the present invention, the second server and the third server are business servers that have completed docking with the first server and established a connection. The first server is a hub server.

[0062] The user has completed the login process of unified authentication by using the first fingerprint information on the first client corresponding to the second server, and the user sends a first request to log in to the third server on the first client to the second s...

Embodiment 3

[0070] An embodiment of the present invention further provides a fingerprint-based authentication method applied to a fingerprint-based authentication system, wherein the system includes at least a first server and a fourth server, figure 2 It is a schematic diagram of the implementation flow of the fingerprint-based authentication method in Embodiment 3 of the present invention, as figure 2 As shown, the method includes:

[0071] Step S201, receiving the third fingerprint information input by the user through the fingerprint input sensor;

[0072] Step S202, comparing the third fingerprint information with the fingerprint library stored in the fourth server to obtain a second comparison result;

[0073] Here, the fourth server is a service server that has been docked with and established a connection with the first server.

[0074] Step S203, judging whether the second comparison result is a comparison failure;

[0075] Step S204, if the second comparison result is a com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fingerprint-based authentication method, a fingerprint authentication-based first server and a fingerprint authentication-based terminal, wherein the method comprises the following steps: confirming first fingerprint information; comparing the first fingerprint information with a fingerprint library stored in the first server itself, and obtaining a first comparison result; judging whether the first comparison result is comparison failure; if the first comparison result is comparison failure, taking the first fingerprint information as a unified authentication accountof a user and storing the uniform authentication account and passwords of the unified authentication account in the own fingerprint library of the first server.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a fingerprint-based authentication method, a first server and a terminal based on fingerprint authentication. Background technique [0002] With the development of information technology and mobile Internet, the functions of smart phones are becoming more and more powerful, and various applications on smart phones are also rich and colorful, covering all aspects of life, and getting more and more closely connected with people's lives. Indispensable part of daily life. Users have independent accounts in each application system, which results in the need to enter the corresponding user identification number (Identification, ID) and password when accessing different application systems. Multiple user IDs and passwords are easy to remember. If you forget or misremember the user ID or password of a certain business website, you will not be able to log in, which will bring poo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0618H04L9/0643H04L63/0861
Inventor 罗兵兵任伊娜车斌
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products